Cloud-based Business Intelligence Goes Mainstream

Image result for cloud-based business intelligence dresner
More than 50 percent of businesses currently use or plan to use cloud-based business intelligence, according to a survey by Dresner Advisory Services. Still several common hurdles have limited cloud-based BI's adoption in some companies.
The report, the latest in the firm’s Wisdom of Crowds series of research, examines usage trends and perceptions of cloud BI. The primary barrier to adoption of cloud-based BI remains security, and cloud BI as a concept retains “mid-tier importance” among the 775 survey respondents worldwide.
Other findings of the research: Sales and marketing attach the greatest importance and are the greatest users of cloud BI; very small and very large organizations attach the most importance to cloud BI; private cloud BI models remain the most preferred, followed by public; and “bread and butter” functionality including self-service, dashboards, and visualization top the list of required cloud BI features.
The perceived benefits of cloud BI continue to reflect conventional wisdom of cost savings, easier maintenance and greater access to BI, according to the study.
"We began analyzing the cloud BI market while it was still in its early days and have tracked with great interest the shifts in deployment and perception that have surfaced over the past four years,” Howard Dresner, founder and chief research officer at Dresner Advisory Services, said in a statement. “Most telling, those organizations who perceive themselves as more successful with their business intelligence projects are those most likely to use cloud BI today.” 
Info-Management:  http://bit.ly/1aZlUNm

 

« Cybercrime More Profitable Than Drug Trading
Wi-Fi on Planes is Vulnerable to Inflight Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.